Authenticated key agreement protocol based on hierarchical identity for provable security
Cao Chenlei Liu Mingxi Zhang Ju Yang Yixian
At present, authentication key agreement protocol based on Identity is a trusted third party with a single private key generator (PKG), but the system structure is difficult to meet the requirement of identity layering registration and authentication. This paper reconstructs the constituent elements of the private key based on the hierarchical Identity Encryption (Hibe) system. In this paper, a hierarchical identity based authentication Key agreement protocol is proposed to provide a secure session key negotiation mechanism for cloud entities belonging to different levels by using bilinear mapping on elliptic curve multiplication cyclic group. Based on CDH (computational Diffie) and GDH (Gap Diffie) hypothesis, this paper proves that the new protocol has known key security, forward security and Eck forward security under the PKG model, And can resist the camouflage attack based on key leakage.
Authenticated key agreement protocol based on hierarchical identity for provable security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.